Training
Certifications
Books
Special Offers
Community




 
Microsoft® Windows® XP Professional Resource Kit, Second Edition
Author The Microsoft Windows Team
Pages 1744
Disk 1 Companion CD(s)
Level Advanced
Published 06/11/2003
ISBN 9780735619746
ISBN-10 0-7356-1974-3
Price(USD) $59.99
To see this book's discounted price, select a reseller below.
 

More Information

About the Book
Table of Contents
Sample Chapter
Index
Related Series
Related Books
About the Author

Support: Book & CD

Rate this book
Barnes Noble Amazon Quantum Books

 

Table of Contents continued


PART III  SECURITY 
15  Logon and Authentication653
    Authentication Overview654
        New in Windows XP Professional654
        Credentials and Validation656
        Security Principals657
        Security Groups659
        Types of Logon659
        Using RunAs to Start a Program662
    Authentication Protocols664
        Protocol Selection665
        NTLM666
        Kerberos V5 Authentication Protocol668
    Managing Credentials674
        Password Management676
        Smart Cards681
        Automating Logon683
    Authentication Policy Options685
        Account Policies686
        Local Policies689
    Auditing and Troubleshooting694
        Security Options694
        Audit Policy695
        Security Event Messages696
    Additional Resources697
16  Authorization and Access Control699
    Overview of Access Control700
        Important Terms700
        Key Concepts702
        Planning for Effective Access Control706
    User Accounts and Security Groups707
        User Account Creation707
        Types of Security Groups708
        Managing Permissions by Nesting Groups719
    Working with Access Control Lists721
        Access Control Entries724
        How Access Control Is Applied to New Objects725
        Default Permissions728
        Using CACLs732
    Managing User Rights by Using Security Groups733
        Security Group Upgrade from Windows NT 4.0733
        Security Group Creation in a Clean Installation733
        Managing Anonymous Logons736
        Managing Network Authentication736
    Using Security Policy739
        Software Restriction Policies740
        Security Templates742
        Working with Local Security Policy747
    Auditing and Analyzing Access Control754
        Enabling Auditing Policies755
        Using the Event Viewer758
        Using the Security Configuration and Analysis Snap-in759
        Configuring and Analyzing Operations by Using Secedit.exe763
    Additional Resources765
17  Encrypting File System767
    Overview of EFS768
    Components of EFS770
    Encrypting and Decrypting by Using EFS772
        What Can Be Encrypted773
        How Files Are Encrypted773
        Working with Encryption and Decryption779
    Remote EFS Operations on File Shares and Web Folders784
        Remote EFS Operations in a File Share Environment785
        Remote EFS Operations in a Web Folder Environment790
    Delivering EFS Certificates to Users792
        How EFS Uses Certificates792
        Determining Whether an EFS Certificate Exists793
        Obtaining an EFS Certificate in a Stand-Alone Environment794
        Using Enterprise Certification Authorities to Issue Certificates794
        Renewing Certificates and Keys795
        Replacing Self-Signed Certificates with CA-issued Certificates796
    Authorizing Multi-User Access to Encrypted Files797
        How Users Are Authorized for Access to Encrypted Files797
        Considerations for Sharing Encrypted Files799
        Sharing Encrypted Files800
    Taking Recovery Precautions801
        Data Recovery and Data Recovery Agents802
        Configuring Data Recovery Policy in a Stand-Alone Environment805
        Exporting and Importing EFS and DRA Certificates and Private Keys806
        Backing Up and Restoring Encrypted Files or Folders809
        Recovering Encrypted Files809
    Strengthening Key and File Security810
        Certificate and Public Key Storage811
        Private Key Storage811
        Master Key Storage and Security812
        Enabling the Startup Key813
        Enabling 3DES815
        Increasing Security for Open Encrypted Files817
    Disabling EFS818
    Tips for Implementing EFS820
    Troubleshooting EFS822
        Unable to Encrypt Files822
        Unable to Decrypt Remote Files823
        Unable to Open Encrypted Files823
        Encrypted File Is Unencrypted When Copied or Moved825
        Virus Check Program Cannot Check All Files825
        Common Error Messages826
    Additional Resources827
18  Implementing TCP/IP Security829
    Securing TCP/IP830
        Understanding Internet Layer Protocols830
        Understanding Transport Layer Protocols833
        Common Threats to TCP/IP835
        Configuring TCP/IP Security in Windows 2000 and Windows XP838
    Using IPSec847
        Securing Data Transmission with IPSec Protocols847
        Choosing Between IPSec Modes850
        Selecting an IPSec Authentication Method850
        Creating IPSec Policies851
        How IPSec Works855
        Monitoring IPSec858
    Best Practices860
    Additional Information860
19  Securing Mobile Computers863
    Understanding Mobile Computers864
        Increase in the Possibility of Being Lost or Stolen864
        Difficulty in Applying Security Updates866
        Exposure to Untrusted Networks866
        Eavesdropping on Wireless Connectivity867
    Implementing Additional Security for Laptop Computers867
        Hardware Protection868
        Boot Protection869
        Data Protection871
        User Education873
    Securing Wireless Networking in Windows XP873
        Using Wireless Zero Configuration in Windows XP873
        Configuring Security for 802.11 Wireless Network Connectivity874
        Configuring 802.11 Security with 802.1x877
    Best Practices878
    Additional Information879
PART IV  NETWORKING 
20  Connecting Clients to Windows Networks883
    Microsoft Networking Overview884
        New in Microsoft Networking884
        Fundamental Configuration Tasks885
    Microsoft Network Environments887
        Peer-to-Peer Network Environment887
        Windows Domain Environment888
    Account Authentication894
        Authentication Methods894
        Logon Names894
    TCP/IP and Other Network Protocols895
        Benefits of TCP/IP895
        Configuring the Protocol Binding Order896
    Locating Resources by Publishing Objects897
        Computer Browser and Browsing Roles898
        Logon Scripts902
    Group Policy and System Policy Settings902
        System Policy and Group Policy Coexistence904
        Checking Local and Domain Policy Compatibility906
        Group Policy Settings for Network Connections907
    Joining the Network Environment913
        Network Identification Wizard913
        Changing Windows Workgroup Membership914
        Manually Joining a Windows Domain914
    Confirming Domain and Workgroup Membership915
        Testing a Workgroup User Account915
        Testing a Domain User Account915
        Establishing a Secure Channel916
    Troubleshooting Microsoft Networking917
        Tools for Troubleshooting917
        Troubleshooting Joining Networks920
        Troubleshooting Logon Problems922
        Troubleshooting Group Policy and System Policy924
        Troubleshooting My Network Places924
    Additional Resources925
21  Configuring TCP/IP927
    Overview of Windows XP Professional TCP/IP928
        Defining TCP/IP929
        TCP/IP Features in Windows XP Professional930
        Determining Network Requirements for TCP/IP932
    Installing and Configuring TCP/IP932
        Default and Manual Installation of TCP/IP932
        Configuring IP Properties933
    Verifying IP Installation933
    Using Netsh to Configure and Monitor Computers935
    Advanced IP Configuration938
        Understanding Internetwork Routing Strategy938
        IP Packet Transmission939
        Configuring the Local IP Routing Table940
    IP Security and Filtering946
        IPSec947
        Configuring IPSec Policies950
        TCP/IP Filtering954
    Configuring Multihoming955
        Configuring Multiple Network Adapters or Media Types956
        Multihoming Considerations957
    TCP/IP Troubleshooting959
        TCP/IP Troubleshooting Tools959
        Troubleshooting Routing964
        Troubleshooting Gateways965
    Additional Resources966
22  Configuring IP Addressing and Name Resolution967
    Overview of Addressing and Name Resolution968
        Types of IP Addresses968
        Types of IP Address Assignment969
        Types of TCP/IP Name Resolution970
    Enabling IP Address Assignment970
        Choosing an IP Address Assignment Method971
        Configuring DHCP972
        Configuring APIPA974
        Configuring an IP Address Manually976
        Configuring Multiple IP Addresses on a Network Adapter977
        Configuring an Alternate IP Address979
    Configuring TCP/IP Name Resolution980
        Choosing a Name Resolution Method981
        Configuring DNS to Resolve Host Names and Domain Names982
        Configuring Dynamic Update1003
        Editing Hosts Files1007
        Configuring NetBIOS Name Resolution1007
    Troubleshooting Name Resolution and Addressing1017
        Checking NetBIOS Name Resolution1017
        Checking Hosts Files and DNS Name Resolution1019
        Troubleshooting IP Addressing1021
    Additional Resources1022
23  Connecting Remote Offices1023
    Remote Office Overview1024
        Local Connections in a Remote Office1024
        Remote Connections to a Private Network1025
        Connecting to the Internet1025
        What's New1025
    Connection Types1025
        Remote Access Connection Types1026
        VPN Connection Types1028
        Local Connection Types1030
        Direct Cable Connections1032
        Wide Area Network Connection Types1033
        Incoming Connection Types1035
        Connection-defined Connections1035
    Managing Outgoing Connections1036
        Using the New Connection Wizard to Choose Connection Types1037
        What Can I Configure?1040
        Configuring Remote Connections1041
        Configuring Advanced Settings1041
        Deploying Connection Manager1047
        Accessing Network Resources1049
    Managing Incoming Connections1049
    Configuring Home Networks1051
        Home Network Hardware Requirements1052
        Home Network Configuration Instructions1053
    Home and Small Office Local Connections1054
    Remote Network Security1057
        Authentication1058
        Authentication Protocols1060
        Data Encryption1064
    Internet Connection Sharing1066
        Using DHCP with ICS1067
        ICS Scenario: Connecting Your Branch Office's Intranet to the Internet1068
    Internet Connection Firewalls1074
    Troubleshooting Remote Office Network Connections1075
        Troubleshooting Tools1075
        Troubleshooting Common Local Area Configuration Problems1077
        Troubleshooting Common Remote Access Configuration Problems1077
        Troubleshooting Common Internet Access Configuration Problems1083
    Additional Resources1084
24  Configuring Telephony and Conferencing 1085
    Overview of Telephony and Conferencing 1086
        Telephony Environments 1086
        TAPI 3.1 1092
        Quality of Service 1095
    Configuring Telephony and Conferencing 1096
        Configuring Modems 1096
        Configuring ISDN Support 1104
        Configuring Client/Server Telephony Support 1106
        Configuring TAPI IP Telephony 1107
    Troubleshooting Telephony and Conferencing 1109
        Troubleshooting Modems 1110
        Troubleshooting PSTN Telephony 1111
        Troubleshooting Conferencing Applications 1112
    Additional Resources 1115
PART V  SYSTEM TROUBLESHOOTING 
25  Troubleshooting Concepts and Strategies1119
    Troubleshooting Overview1120
    Troubleshooting Concepts1121
        Identify Problem Symptoms1121
        Check Technical Information Resources1124
        Review Your System's History1126
        Check Firmware Versions1128
    Troubleshooting Strategies1132
        Isolate and Resolve Hardware Problems1133
        Isolate and Resolve Software Issues1134
        Avoid Common Pitfalls1134
        Document and Evaluate the Results1140
        Take Proactive Measures1142
    Summary and Checklist1143
    Additional Resources1145
26  Troubleshooting Disks and File Systems1147
    New in Troubleshooting Disks and File Systems1148
    Maintenance and Troubleshooting Tools1149
        Chkdsk1149
        Disk Defragmenter1163
        Recovery Console1169
        Automated System Recovery1169
        DiskProbe1170
        Dmdiag1171
    Disk and Volume Status Descriptions1172
        Disk Status Descriptions1173
        Volume Status Descriptions1175
    Viruses That Affect the MBR and Boot Sectors1177
        MBR Viruses1177
        Boot Sector Viruses1178
        How MBR and Boot Sector Viruses Affect Windows XP Professional1178
        Guidelines for Avoiding Viruses1179
        Treating an MBR or Boot Sector Virus Infection1180
    Repairing Damaged MBRs and Boot Sectors in x86-based Computers1181
        Restoring the MBR1182
        Replacing the Boot Sector1184
    Stop Messages for Disks and File Systems1186
    Other Disk Problems1187
    Disk Sectors Critical to Startup1188
        Disk Sectors on MBR Disks1189
        Disk Sectors on GPT Disks1211
    Additional Resources1219
27  Troubleshooting Startup1221
    Understanding the Startup Process1222
        Startup Phases for x86-based Systems1222
        Startup Phases for Itanium-based Systems1236
        Summary of the Startup Process1241
    Following a Process for Startup and Recovery1242
        Restoring to the Last Known Good Configuration1243
        Starting in Safe Mode1245
        Rolling Back Drivers1246
        Using System Restore to Undo Changes1247
        Temporarily Disabling Applications and Processes1247
        Temporarily Disabling Services1255
        Uninstalling Software1262
        Using Recovery Console1263
        Reviewing and Correcting Boot.ini Settings on x86-based Systems1267
        Reviewing and Correcting NVRAM Startup Settings on Itanium-based Systems1276
        Performing a Parallel Windows XP Professional Installation1278
        Saving System Files and Settings by Using Automated System Recovery1279
    Recovering from Hardware-related Problems1279
        Checking Your Hardware1280
        Simplifying Your Hardware Configuration1284
        Checking the Operating System Configuration1284
        Diagnosing Disk-related Problems1285
        Resolving Shutdown Problems1287
        Resolving Power Management Problems on x86-based Systems1288
    Additional Resources1292
PART VI  APPENDIXES 
A  System Files Reference1295
    System Files1296
    Startup Files1296
    Folders on the Local Disk1297
    Windows Folder1298
    System32 Folder1299
    Extracting Files from the Operating System CD1300
    Additional Resources1303
B  User Rights1305
    Logon Rights1306
    Privileges1308
C  Common Stop Messages for Troubleshooting1315
    Stop Message Overview1316
        Defining Terms1317
        Stop Message Screen Sections1319
        Types of Stop Messages1321
        Memory Dump Files1326
        Using Memory Dump Files to Analyze Stop Errors1331
        Stop Message System Event Log Reporting1336
        Preventing System Restarts After a Stop Error1336
    Common Stop Messages1337
        Stop 0x0000000A or IRQL_NOT_LESS_OR_EQUAL1337
        Stop 0x0000001E or KMODE_EXCEPTION_NOT_HANDLED1338
        Stop 0x00000024 or NTFS_FILE_SYSTEM1341
        Stop 0x0000002E or DATA_BUS_ERROR1343
        Stop 0x0000003F or NO_MORE_SYSTEM_PTES1344
        Stop 0x00000050 or PAGE_FAULT_IN_NONPAGED_AREA1346
        Stop 0x00000077 or KERNEL_STACK_INPAGE_ERROR1347
        Stop 0x00000079 or MISMATCHED_HAL1349
        Stop 0x0000007A or KERNEL_DATA_INPAGE_ERROR1350
        Stop 0x0000007B or INACCESSIBLE_BOOT_DEVICE1352
        Stop 0x0000007F or UNEXPECTED_KERNEL_MODE_TRAP1354
        Stop 0x0000009F or DRIVER_POWER_STATE_FAILURE1356
        Stop 0xBE or ATTEMPTED_WRITE_TO_READONLY_MEMORY1358
        Stop 0xC2 or BAD_POOL_CALLER1358
        Stop 0x000000CE or DRIVER_UNLOADED_WITHOUT_CANCELLING_PENDING_OPERATIONS1360
        Stop 0x000000D1 or DRIVER_IRQL_NOT_LESS_OR_EQUAL1361
        Stop 0x000000D8 or DRIVER_USED_EXCESSIVE_PTES1362
        Stop 0x000000EA or THREAD_STUCK_IN_DEVICE_DRIVER1362
        Stop 0x000000ED or UNMOUNTABLE_BOOT_VOLUME1363
        Stop 0x000000F2 or HARDWARE_INTERRUPT_STORM1364
        Stop 0xC000021A or STATUS_SYSTEM_PROCESS_TERMINATED1366
        Stop 0xC0000221 or STATUS_IMAGE_CHECKSUM_MISMATCH1367
    Hardware Malfunction Messages1368
    Stop Message Checklist1369
        Check Your Software1370
        Check Your Hardware1373
    Additional Resources1376
D  Tools for Troubleshooting1377
    Using This Appendix1378
    Installing and Running Troubleshooting Tools1378
        Installing Tools1379
        Tool Interface Types1380
        Help and Support Center1383
    Disaster Recovery Tools1384
        Last Known Good Configuration1386
        Using Safe Mode1387
        Device Driver Roll Back1390
        System Restore1392
        Using System Restore1394
        Add or Remove Programs1401
        Recovery Console1401
        Backup1418
        Automated System Recovery1419
    Application and Service Tools1420
        Bootcfg1423
        Boot Logging1423
        Dependency Walker1425
        Device Manager1425
        DirectX Diagnostic Tool1425
        Dr. Watson1428
        Error Reporting1429
        Event Query1430
        Event Triggers1430
        Event Viewer1430
        Global Flags Editor1431
        Group Policy Snap-in1431
        Group Policy Results1432
        Group Policy Update1432
        Kernel Debugger1433
        Memory Pool Monitor1433
        Online Crash Analysis Web Site1434
        OpenFiles1434
        Performance Snap-in1434
        Process and Thread Status1434
        Program Compatibility Wizard1435
        Registry Editor1436
        Resultant Set of Policy1438
        RunAs (Command-Line Tool)1439
        RunAs (GUI Feature)1439
        SC1439
        Services Snap-in1440
        Shutdown Event Tracker1440
        System Configuration Utility1442
        Systeminfo1445
        System Information1445
        Task Kill1448
        Task List1449
        Task Manager1449
        Uninstall Windows XP Professional1450
    Remote Management Tools1452
        Computer Management Tool1452
        Remote Desktop1453
        Remote Assistance1455
        Telnet1460
    Disk and Maintenance Tools1461
        Chkdsk1462
        Disk Cleanup1463
        Disk Defragmenter1463
        Disk Management and DiskPart1464
        Fsutil.exe1465
        My Computer Information in Help and Support Center1465
        Windows Update1466
    System File Tools1467
        Driver Signing and Digital Signatures1468
        Driver Query1471
        Windows File Protection1473
    Networking Tools1474
        GetMac1475
        IP Config1476
        IP Security Monitor1476
        NetBT Statistics1477
        Netsh1477
        Netstat1477
        Network Connectivity Tester1478
        Network Diagnostics1478
        Network Monitor Capture Utility1478
        NSLookup1479
        PathPing1479
    Additional Resources1480
E  Security Event Messages1481
    Viewing Security Event Messages1482
    System Event Messages1483
    Logon Events1484
    Object Access Events1490
    Privilege Use Events1491
    Detailed Tracking Events1492
    Policy Change Events1494
    User Management Events1498
    Account Logon Events1507
    Directory Service Access Events1510
F  Device Manager Error Codes1511
    Additional Resources1518
G  Differences with Windows XP Home Edition1519
    Windows XP Home Edition Overview1520
    Comparing Windows XP Home Edition and Windows XP Professional Feature Differences1521
        Corporate Management1521
        Corporate Security1522
        Networking Features1523
        File System Features1523
        User Interface Features1524
        Advanced or Power-User Features1524
    Additional Resources1525
H  Differences with Windows XP 64-Bit Edition1527
    Overview of Windows XP 64-Bit Edition1528
    Features Not Supported in Windows XP 64-Bit Edition1529
    Windows XP 64-Bit Edition Requirements1531
    Additional Resources1533
I  Accessibility for People with Disabilities1535
    Customizing for Accessibility1536
        Windows Installer1536
        Group Policy1536
        User Profiles1536
        Customizing the Desktop1538
        Utility Manager1538
    Configuring Accessibility Features1539
    Setting Accessibility Options by Type of Disability1540
        Options for Users with Vision Impairments1542
        Options for Users with Mobility Impairments1546
        Options for Users with Hearing Impairments1556
        Options for Users with Cognitive Disabilities1557
        Options for Users Who Experience Seizures1559
    Adding Assistive Technology Products1560
    Additional Resources1561
J  Interoperability Solutions1563
    Overview of Microsoft Interoperability Solutions for Windows XP Professional1564
    Interoperability with UNIX1566
    Interoperability with Novell NetWare1568
    Interoperability with IBM Host Systems1569
        Microsoft Host Integration Server1569
        Host Integration Server Client Software Components1570
    Interoperability with Apple Macintosh Systems1571
        Windows Server 2003 Services for Macintosh1571
        Microsoft Office for Apple Macintosh Operating Systems1572
        Microsoft Internet Applications for Apple Macintosh Computers1573
GLOSSARY1575
INDEX1643


Previous



Last Updated: June 2, 2003
Top of Page